MENU
View Categories

Projects Data Processing & Security Addendum

4 min read

AI Doc Summarizer Doc Summary

Module: Utsav Volunteers™ (Utsav Projects)
Document Type: Data Addendum
Trademark: Utsav Volunteers™ is a trademark of MyMahotsav Futuretech Ltd
Effective Date: 24th February 2026
Version: 1.0


Part A: Plain English Summary #

How We Handle Your Project Data #

This addendum explains in detail how we manage, store, and protect the data you entrust to Utsav Projects. It supplements the main Terms of Service.

The Simple Truth #

  • Your Data Is Yours: All project content—tasks, files, discussions—remains your property. We simply host it .

  • We Use Industry Standards: We implement reasonable security measures to protect your data, but no system is 100% secure .

  • Backups Are Not Guaranteed: While we maintain backups, you should always keep your own copies of important files .

  • Integrations Share Data: When you connect to third-party services, your data may be shared according to their terms .

  • Confidentiality Matters: Project members should respect the confidentiality of project information.


Part B: Data Processing Provisions #

1. DATA OWNERSHIP #

1.1 User Ownership: All User Content stored within the Service remains the sole property of the user or organization that created it. We do not claim any ownership rights .

1.2 No Rights Granted: Nothing in these Terms grants us any right to use, reproduce, or distribute your User Content except as necessary to operate the Service .

2. DATA STORAGE AND SECURITY #

2.1 Storage Location: User Content may be stored on servers located in various jurisdictions, including the United Kingdom, India, and other countries. By using the Service, you consent to such storage .

2.2 Security Measures: We implement commercially reasonable technical and organizational measures to protect User Content from unauthorized access, disclosure, alteration, or destruction. These measures include:

  • Encryption of data in transit

  • Access controls and authentication requirements

  • Regular security assessments

  • Secure data center infrastructure

2.3 No Absolute Security: Despite our efforts, no method of transmission over the Internet or method of electronic storage is 100% secure. We cannot guarantee absolute security .

3. DATA BACKUPS #

3.1 Backup Practices: We perform regular backups of User Content as part of our standard operating procedures. Backups are stored in geographically diverse locations where feasible .

3.2 Backup Limitations: Backups are created for disaster recovery purposes only. We do not guarantee that:

  • Backups will be complete or accurate

  • Backups will be available for restoration upon request

  • Data from any specific point in time can be recovered

3.3 User Responsibility: You are solely responsible for maintaining your own backup copies of any important User Content. The Service is not a backup solution .

3.4 Data Restoration: In the event of data loss, we will use commercially reasonable efforts to restore your User Content from the most recent available backup. This is our sole obligation regarding data loss .

4. DATA RETENTION AND DELETION #

4.1 Active Accounts: User Content is retained for as long as your account remains active.

4.2 Account Deletion: When you delete your account:

  • User Content will be removed from active systems within 30 days

  • Backup copies may persist for up to 90 days before being overwritten

  • Some data may be retained as required by law

4.3 Project Closure: When a Project is closed or deleted by the Project Creator:

  • The Project and its contents are removed from active view

  • Members lose access to Project data

  • Backup retention periods apply as above

5. THIRD-PARTY INTEGRATIONS #

5.1 Data Sharing: When you enable integrations with third-party services (GitHub, Bitbucket, Slack, etc.), User Content may be transmitted to those services. Such transmissions are governed by the third party’s terms and privacy policies .

5.2 No Liability: We are not responsible for how third-party services handle your data. You should review their privacy policies before enabling integrations .

5.3** Integration Security: Third-party integrations operate under their own security frameworks. We do not guarantee the security of any integrated service. #

6. CONFIDENTIALITY #

6.1 Project Confidentiality: Users acknowledge that Projects may contain confidential or sensitive information. Project Members agree to:

  • Maintain the confidentiality of such information

  • Not disclose Project information to unauthorized third parties

  • Use Project information only for legitimate Project purposes

6.2 No Confidentiality Guarantee: We do not guarantee that Project Members will maintain confidentiality. Disputes regarding confidentiality are between the parties involved .

7. INTERNATIONAL DATA TRANSFERS #

7.1 Cross-Border Processing: Your User Content may be processed in countries other than your own. Where required by law, we implement appropriate safeguards for such transfers, including Standard Contractual Clauses for transfers from the European Economic Area.

8. DATA SUBJECT RIGHTS #

8.1 GDPR Rights: For users in the European Economic Area or United Kingdom, you have rights to:

  • Access your personal data

  • Correct inaccurate data

  • Delete your data (“right to be forgotten”)

  • Restrict or object to processing

  • Data portability

8.2 Exercising Rights: To exercise your rights, contact privacy@utsavprojects.com.

9. BREACH NOTIFICATION #

9.1 Security Breaches: In the event of a security breach that compromises User Content, we will:

  • Notify affected users without undue delay

  • Provide information about the nature of the breach

  • Advise on steps users can take to protect themselves

  • Cooperate with regulatory authorities as required

Responses

Your email address will not be published. Required fields are marked *